Appsian Blog Center

These Resources Will Help You Navigate The Challenges Of ERP Threats

Read Our blog

PeopleSoft applications process and store vast amounts of customer, employee, and financial data that are constantly accessed by an increasing number of users from various…...
April 12, 2022
Data privacy is often associated with how companies are allowed to collect and handle customer data. Lost in the data privacy breach headlines is that…...
April 6, 2022
When it comes to PeopleSoft data privacy, the financial, reputational, and regulatory impact of having your employees’ or executives’ compensation or personal data accessed can…...
March 31, 2022
On December 9, 2021, the Federal Trade Commission (FTC) published a final rule amending the requirements for safeguarding customer information under the Gramm-Leach-Bliley Act (GLBA)…...
March 11, 2022
Oracle EBS provides a suite of applications that perform several sensitive transactions like payroll processing, order processing, and financial reporting. This makes it crucial for…...
March 11, 2022
Following up on last year’s Executive Order to help improve the nation’s cybersecurity posture, the White House released a 30-page zero trust strategy document outlining…...
March 3, 2022
Appsian’s Vice President of Product Strategy & Customer Experience, David Vincent, appears in the latest episode of Brilliance Security Magazine Podcast. The focus of the…...
March 2, 2022
Over the last two years, organizations had to move employees out of a secure office environment and provide them with access to corporate ERP applications…...
December 23, 2021
Like most state governments, the State of Kansas wanted employees and non-employees to access PeopleSoft self-service within and outside the corporate network. They encountered a…...
December 22, 2021
Protecting and maintaining the integrity of data, especially sensitive data, is one of the core objectives of any security strategy. Since a majority of this…...
November 24, 2021
Identity, Governance, and Administration (IGA) is defined by Gartner as an “activity within the identity and access management function that concerns the governance and administration of a unique…...
October 27, 2021
Appsian Security’s Vice President of Product Strategy and Customer Experience, David Vincent, recently appeared on Security Guy TV to talk about ERP Security, Risk and…...
September 30, 2021
Data breaches caused by ransomware attacks, phishing scams, and state-sponsored hacker groups tend to grab the headlines. However, the reality is that insider threat activity…...
September 29, 2021
Organizations that use ERP applications like SAP, PeopleSoft, Oracle EBS, etc., manage thousands of users. Most of these users have limited roles that only allow…...
September 24, 2021
Every time a major data breach makes the headlines, the company in question almost always struggles to answer the most important question: Why did it…...
September 23, 2021
If you’re a multinational enterprise (MNE) that does business in or with China, you’re likely aware of the Data Security Law (DSL) that went into…...
September 9, 2021
Agility is the name of the game in today’s ERP data security landscape. Organizations are being challenged to detect threats as they happen, quickly address vulnerabilities, and…...
August 13, 2021
You know how vital SAP data security can be in the age of data privacy and compliance regulations such as GDPR, CCPA, SOX, and others. If…...
August 11, 2021
Third-Party Risk Management (TRPM) is the process of analyzing and controlling risks presented to your company, your operations, your data, and your finances by Third…...
August 10, 2021
On May 12th, President Biden signed an Executive Order to help improve the nation’s cybersecurity posture and strengthen Federal networks. This order was preceded by…...
May 17, 2021
Taken from Moshe Panzer's May 4th blog post on xpandion.com: For 14 years, Xpandion has been on a mission: to help organizations create better alignment…...
May 5, 2021
Implementing enterprise resource planning (ERP) systems has always been both mission-critical and notoriously difficult. They must align with business processes, but the organization distributes those…...
April 7, 2021
With 2020 nearly three months behind us and the rollout of COVID-19 vaccines picking up speed, organizations are looking hopefully to 2021 and beyond. Optimism…...
March 30, 2021
The sheer breadth and complexity of the procurement process can make maintaining effective internal controls difficult. Organizations must implement business process controls to ensure that…...
March 24, 2021
ERP security had traditionally focused on vulnerability testing for ERP applications, whether hosted on-premise or in the cloud. Given the sensitive nature of ERP transactions,…...
March 11, 2021
If 2020 was the year of hastily enabling secure remote access to ERP applications, then 2021 will be the year when organizations realize that remote…...
February 26, 2021
Appsian's Executive Director for Security Solutions, Greg Wendt, appears in the latest episode of Brilliance Security Magazine Podcast. The focus of the conversation between Greg and host Steven…...
February 2, 2021
While the majority of data breaches are from insider threats—a startling 57% according to the Verizon Insider Threat Report—many organizations overlook these internal dangers. Whether careless or malicious, employee, partner, or contractor, insider threats are difficult to spot and…...
December 9, 2020
With 2020 coming to a close, ensuring business applications are equipped to meet the longterm access demands of 2021 is a critical objective. All around…...
December 8, 2020
While nearly everyone was focusing on the results of the 2020 Presidential race, California voters passed Proposition 24, the California Privacy Rights Act (CPRA) (full…...
November 20, 2020
Insider Threats Are Becoming More Frequent and More Costly to Organizations. Especially Those Using Legacy ERP Systems. Here's How You Can Proactively Prevent the Risk…...
November 16, 2020
Improve ERP System Performance with Real-Time Data Access & Usage Visibility   Your ERP system is a complex ecosystem with multiple deployments, serving hundreds to thousands of users. All of…...
November 6, 2020
When business stakeholders come to you looking for answers, having visibility and context around ERP data access and usage gives you the actionable insight necessary…...
November 4, 2020
Halloween 2020 (the day, not another movie) is right around the corner. Usually, I'm thinking about spirits and haunted houses and candy. Now that I'm…...
October 29, 2020
According to a recent Shred-It survey, both senior leaders and employees indicated data breaches doubling in frequency in the last few years. Consequently, these same…...
October 27, 2020
We are in the midst of a perfect storm of ERP security calamity: the greatest work from home experiment colliding with historic levels of employee churn and…...
August 11, 2020
You spend countless hours, not to mention considerable money, to secure your SAP and Oracle ERP data. One day, you discover that cybercriminals have exposed a vulnerability using an…...
August 6, 2020
Organizations using traditional, on-premise ERP applications like SAP ECC and Oracle PeopleSoft are facing a rapidly changing reality around the collection, storage, and usage of…...
July 28, 2020
Time is almost up for companies scrambling to get their data privacy strategies in compliance with the California Consumer Protection Act (CCPA). Beginning as early as July 1, 2020,…...
June 24, 2020
Thanks to TV commercials for identity protection services, you're forgiven for thinking that that dark web is primarily a place where criminals and hackers buy and sell personal…...
June 1, 2020
Stop me if you've heard (or spoken) this phrase: "All non-essential projects have been put on hold." To be fair, pausing large-scale IT projects (like…...
May 26, 2020
The news is flooded with stories about cybercriminals successfully engaging in phishing and social engineering aimed at exploiting people’s COVID-19 fears, all in order to…...
May 18, 2020
Remote workforces are nothing new to most organizations. According to Buffer’s 2019 State of Remote Work report, 44% of respondents noted that at least part…...
May 15, 2020
Data privacy regulations are rapidly reshaping the way companies monitor, manage, and even define the data they collect and store. Prior to new privacy regulations…...
May 14, 2020
Analytics have always been necessary for informing ERP data security policies. This has never been more relevant than today, in this everybody-works-from-home environment where function leaders…...
May 12, 2020
Every first Thursday in May, cybersecurity professionals collectively roll their eyes at the idea that there is (in fact), a World Password Day. Why? Because…...
May 7, 2020
With remote workplaces being put to the test, organizations are looking to quickly scale their security practices. Unfortunately, many are learning the hard way. They…...
April 22, 2020
I was recently speaking with a customer who expressed a common concern. Because of COVID-19, their entire finance team was forced to work remotely and…...
April 17, 2020
With the influx of remote access demands, VPN vendors are no doubt having their moment. This is 100% warranted, but organizations must be prepared for…...
April 2, 2020
The rapid acceleration from on-location to remote workforce as part of the Coronavirus Pandemic response opened the door to malicious actors accelerating their phishing and…...
March 30, 2020
In September of 2001, I was conducting a comprehensive security audit of a major health care insurer. They were dealing with the early days of…...
March 24, 2020
The streets are empty, offices are closed, and your favorite bar around the corner is shut down until... well, we don't know when. COVID-19 has…...
March 20, 2020
As organizations prepare to protect their workforce from Coronavirus (COVID-19), they need to balance best health practices with best security practices. More companies are establishing…...
March 16, 2020
As we enter the new year, the criticality of securing sensitive data will continue to mold and transform the structure of security strategies across enterprises,…...
December 19, 2019
CCPA – A Quick Review CCPA takes effect on January 1,2020. The spirit of CCPA revolves around consumers taking back control of their personal information…...
October 24, 2019
The numbers are out, and it's more apparent than ever - your ERP system is most likely at risk. A recent study by Onapsis has…...
October 15, 2019
Gartner describes context-aware security as the use of supplemental information to improve security decisions at the time they are made. "Context" meaning the location of access, time,…...
October 11, 2019
What is Zero Trust Security? Zero Trust security is based on the principle of ‘never trust, always verify’. First introduced by Forrester Research, a Zero…...
September 26, 2019
Organizations are facing growing challenges in order to meet the data privacy compliance requirements associated with mandates like The General Data Protection Regulation (GDPR) and…...
August 20, 2019
Organizations are rapidly shifting to workplaces without boundaries - teams are globally dispersed and companies are adopting work-from-home and BYOD (Bring Your Own Device) policies.…...
August 8, 2019
How companies approach data security controls is changing. Segregation of Access (SoAx) is now just as critical as Segregation of Duties (SoD). Who sees sensitive…...
August 5, 2019
We’ve talked extensively about Segregation of Access (SoAx) and how data security threats have evolved to include a range of application authentication attacks. These include…...
June 20, 2019
Well, in today’s post it is all about the logging.  In a future post it will be all about the alerting.  Sensitive data.  What is…...
April 19, 2019
This is a long one and gets techie in areas, but bear with me.  There’s a moral to the story. As regular readers of this…...
April 12, 2019
In the years I’ve been architecting and assessing organizational information security approaches; the typical focus of any effort was on the perimeter protection offered up…...
March 18, 2019
There’s an interesting story from a few years ago.  An angry father marched into the corporate office of Target and demanded to know why they…...
February 25, 2019
This will be the final entry in our current CISO Survival series.  And we’re taking a step back.  We’ve talked about the role of the…...
February 5, 2019
In our previous post, we talked about the role of the CISO and how the rapidly evolving, connected economy is creating challenges around the cataloging…...
February 1, 2019
Do You Even Know What and Where It Is? Not too long ago, I was involved in the war room activities surrounding the breach of…...
January 30, 2019
Representatives of the Open Web Application Security Project (OWASP) periodically release a top 10 list of known vulnerabilities that impact applications across a typical enterprise. …...
January 22, 2019
Most of us are now familiar with what Multi Factor Authentication (MFA) has brought to our daily lives. Try accessing your bank account from a…...
January 10, 2019
There’s an old Hollywood saying that showcases the cinematic battle between the well-armed and the ill-prepared: “Never bring a knife to a gun fight.” Classic…...
January 2, 2019
According to a report from the Information Commissioner (ICO), data breaches are up 75% in two years. Research from the Identity Theft Resource Center also…...
December 5, 2018
Marriott has reported that a massive data breach of its guest reservation system has led to the exposure of over 500 million customer accounts.  The…...
December 3, 2018
The 2015 Anthem Medical Data Breach In August of this year, the United States approved the final judgement against the healthcare company Anthem resulting from…...
November 8, 2018
In today’s information security environment, great technological strides have been made in the areas of network protection, data encryption, intrusion detection, and response. However, you…...
November 2, 2018
Can’t find your answer? Email us at info@appsian.com Why are you changing your brand? We are rebranding in order to position our organization as a leading security and user experience…...
September 11, 2018
June was an interesting legislative month in the state of California.  In the face of an impending ballot initiative that would’ve imposed stringent privacy rules…...
July 23, 2018

Start your free demo

"Learn how you can reduce risk with rapid threat protection, audit response and access control. All from a single, comprehensive platform"

Trusted by hundreds of leading brands